RBI ASSISTANT MAINS COMPUTER KNOWLEDGE
MODEL PAPER- VIRUS
BY: GAZAL BHATNAGAR, VIDHYARTHI DARPAN
Q.1 How many kinds of computer virus exist?
Ans:) 10
Q.2 Name the first virus on the computer?
Ans:) Creeper
Q.3 What malicious program is unable to do anything unless measures are taken to disable the malware attached file?
Ans:) Virus
Q.4 What you should install into your computer to protect a device from virus?
Ans:) Antivirus
Q.5 What is MCAfee?
Ans:) Antivirus
Q.6 Define Antivirus.
Ans:) Computer software designed to prevent, track and remove malware.
Q.7 What is the most popular way of getting a virus on your hard disk computer?
Ans:) By opening electronic mails (E-MAIL).
Q.8 What is frequently delivered to a PC via an email attachment and intended to do harm?
Ans:) Virus
Q.9 When did virus Apple II come into being?
Ans:) 1981
Q.10 Which sort of malware are they?
Ans:) Worms
Q.11 What software is able to replicate continuously with little or no user response?
Ans:) Virus
Q.12 Which is the First boot sector virus?
Ans:) Brain
Q.13 Write the full form of VIRUS.
Ans:) Vital Information Resource Under Slege
Q.14 Which makes the master boot record infected, and it’s hard and a daunting task to kill this virus?
Ans:) Boot Sector Virus
Q.15 What virus is distributed in the software application?
Ans:) Macro virus
Q.16 Which is a type of software that either appears to have or is described as having a collection of useful or desirable features but contains harmful code in reality?
Ans:) Trojans
Q.17 What viruses are commonly transmitted in the floppy drive by a disk left behind?
Ans:) Boot sector
Q.18 Which infection moves openly inside an enormous populace of unapproved email client?
Ans:) Macro
Q.19 What program can monitor your web perusing propensities once introduced on your computer and give you pop-ups that contain ads relevant to the pages and topics you have visited?
Ans:) Adware
Q.20 Which infection surpass PC framework when it boots and annihilate data?
Ans:) Stealth virus
Q.21 Which virus is also known as cavity virus?
Ans:) Space-filler Virus
Q.22 What is the product called that is intended to abuse a PC client and is a wide term covering PC infections, worms, Trojan, adware, and so on?
Ans:) Malware
Q.23 What is a key logger?
Ans:) Spyware
Q.24 Which virus erases all the records that it contaminates?
Ans:) Overwrite Virus
Q.25 What programs can move autonomously from framework to framework and disrupt communication between computers?
Ans:) Worm
Q.26 What are PC programs that are structured by assailants to pick up root or administrative access to your PC?
Ans:) Rootkits
Q.27 Which virus is hard to identify, because they continue to change their form and signature?
Ans:) Polymorphic Virus
Q.28 What is a code-red?
Ans:) Virus
Q.29 Which virus can infect both the executables and the boot sectors?
Ans:) Multipartite Virus
Q.30 What are usually used against targeted websites in denial of service attacks?
Ans:) Zombie